PUBLIC KEY CRYPTO Introduction Knapsack RSA Diffie-Hellman Elliptic Curve Cryptography Public key infrastructure Uses for public key crypto Public Key Infrastructure
HASH FUNCTIONS++ Introduction what is a cryptographic hash function the birthday attack Non-cryptographic hash function? e.tc
ADVANCED CRYPTANALYSIS Introduction Enigma RC4 as used in WEP Linear and differential cryptanalysis e.tc
ACCESS CONTROL
AUTHENTICATION introduction Authentication methods Passwords Biometrics Something you have e.tc
AUTHORIZATION introduction a brief history of authorization access control matrix multilevel security models e.tc